نتایج جستجو برای: intrusion

تعداد نتایج: 18427  

2005
Aleksandar Lazarevic Vipin Kumar Jaideep Srivastava

This chapter provides the overview of the state of the art in intrusion detection research. Intrusion detection systems are software and/or hardware components that monitor computer systems and analyze events occurring in them for signs of intrusions. Due to widespread diversity and complexity of computer infrastructures, it is difficult to provide a completely secure computer system. Therefore...

2010
Ali Yousefi Alireza A Dibazar Theodore W. Berger

In this paper, we present a reliable and accurate low computational complexity classifier for a fence intrusion detection sensor. The sensor, a standalone perimeter security sensor, classifies six different types of intrusion attempts on chain-link fences. The designed classifier, a dynamic sequence analyzer followed by a static classifier, obtains more than 95 percent accuracy in intrusion cla...

2012
James P. Anderson Dorothy Denning

In this paper, we present a new learning algorithm for anomaly based network intrusion detection using improved self adaptive naïve Bayesian tree (NBTree), which induces a hybrid of decision tree and naïve Bayesian classifier. The proposed approach scales up the balance detections for different attack types and keeps the false positives at acceptable level in intrusion detection. In complex and...

2008
James P. Anderson Dorothy Denning

In this paper, a new learning approach for network intrusion detection using naïve Bayesian classifier and ID3 algorithm is presented, which identifies effective attributes from the training dataset, calculates the conditional probabilities for the best attribute values, and then correctly classifies all the examples of training and testing dataset. Most of the current intrusion detection datas...

2014
Alka Chaudhary V. N. Tiwari Anil Kumar

Computer networks are more vulnerable to insider and outsider attacks in recent days due to its widespread use in each field. For that aspect, numbers of security mechanism have been applied to minimize the effect of possible attacks in the network. One of very appealing concept towards network security is intrusion detection system that can able to identify the difference between normal and ab...

Journal: :iranian endodontic journal 0
mojtaba vahid golpayegani department of pedodontics, dental school, shahid beheshti university of medical sciences, tehran, iran. [email protected] nikoo tadayon department of pediatric dentistry, shahid beheshti university of medical sciences, tehran, iran

this report presents a case of 10 years old girl who was referred to the pediatric dentistry clinic sustaining a severe trauma led to crown fracture and intrusive luxation of immature maxillary incisors. antibiotic therapies were initiated at first visit, and after surgical exposure both intruded and extruded teeth were endodontically treated by calcium hydroxide. orthodontic repositioning was ...

Energy consumption is considered as a critical issue in wireless sensor networks (WSNs). Batteries of sensor nodes have limited power supply which in turn limits services and applications that can be supported by them. An efcient solution to improve energy consumption and even trafc in WSNs is Data Aggregation (DA) that can reduce the number of transmissions. Two main challenges for DA are: (i)...

Hosseini, , Sheibi, ,

Considering the importance of plagioclase in reconstructing magma cooling processes, the size and shape distribution of this mineral is investigated for Chah - Musa sub-volcanic intrusion (NW Toroud- Semnan Province). The slopes of CSD diagrams, the natural logarithm of the density of the crystalline density (n) against the length of the crystal (L), show plagioclase phenocrysts available in th...

2013
Wen Li Fei Chen Feng Zhang Wanghui Ding Qingsong Ye Jiejun Shi Baiping Fu

OBJECTIVE Molar intrusion by mini-screw implantation can cause different degrees of root resorption. However, most methods (2-D and 3-D) used for evaluating root resorption have focused on the root length without considering 3-D resorption. The purpose of this study was to volumetrically evaluate root resorption using cone beam computed tomography(CBCT) after mini-screw implant intrusion. MAT...

2011
Mirco Marchetti Michele Colajanni Fabio Manganiello

Cyber attacks are becoming increasingly complex, especially when the target is a modern IT infrastructure, characterized by a layered architecture that integrates several security technologies such as firewalls and intrusion detection systems. These contexts can be violated by a multistep attack, that is a complex attack strategy that comprises multiple correlated intrusion activities. While a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید